]>
Commit | Line | Data |
---|---|---|
1da177e4 LT |
1 | /* |
2 | * fs/cifs/cifsfs.c | |
3 | * | |
2b280fab | 4 | * Copyright (C) International Business Machines Corp., 2002,2008 |
1da177e4 LT |
5 | * Author(s): Steve French (sfrench@us.ibm.com) |
6 | * | |
7 | * Common Internet FileSystem (CIFS) client | |
8 | * | |
9 | * This library is free software; you can redistribute it and/or modify | |
10 | * it under the terms of the GNU Lesser General Public License as published | |
11 | * by the Free Software Foundation; either version 2.1 of the License, or | |
12 | * (at your option) any later version. | |
13 | * | |
14 | * This library is distributed in the hope that it will be useful, | |
15 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | |
16 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See | |
17 | * the GNU Lesser General Public License for more details. | |
18 | * | |
19 | * You should have received a copy of the GNU Lesser General Public License | |
20 | * along with this library; if not, write to the Free Software | |
21 | * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA | |
22 | */ | |
23 | ||
24 | /* Note that BB means BUGBUG (ie something to fix eventually) */ | |
25 | ||
26 | #include <linux/module.h> | |
27 | #include <linux/fs.h> | |
28 | #include <linux/mount.h> | |
29 | #include <linux/slab.h> | |
30 | #include <linux/init.h> | |
31 | #include <linux/list.h> | |
32 | #include <linux/seq_file.h> | |
33 | #include <linux/vfs.h> | |
34 | #include <linux/mempool.h> | |
6ab16d24 | 35 | #include <linux/delay.h> |
45af7a0f | 36 | #include <linux/kthread.h> |
7dfb7103 | 37 | #include <linux/freezer.h> |
fec11dd9 | 38 | #include <linux/namei.h> |
b8c32dbb | 39 | #include <linux/random.h> |
c6e970a0 | 40 | #include <linux/uuid.h> |
a9ae008f | 41 | #include <linux/xattr.h> |
3eb9a889 | 42 | #include <net/ipv6.h> |
1da177e4 LT |
43 | #include "cifsfs.h" |
44 | #include "cifspdu.h" | |
45 | #define DECLARE_GLOBALS_HERE | |
46 | #include "cifsglob.h" | |
47 | #include "cifsproto.h" | |
48 | #include "cifs_debug.h" | |
49 | #include "cifs_fs_sb.h" | |
50 | #include <linux/mm.h> | |
84a15b93 | 51 | #include <linux/key-type.h> |
e545937a | 52 | #include "cifs_spnego.h" |
f579cf3c | 53 | #include "fscache.h" |
3792c173 | 54 | #include "smb2pdu.h" |
1c780228 PA |
55 | #ifdef CONFIG_CIFS_DFS_UPCALL |
56 | #include "dfs_cache.h" | |
57 | #endif | |
1da177e4 | 58 | |
cb7a69e6 DD |
59 | /* |
60 | * DOS dates from 1980/1/1 through 2107/12/31 | |
61 | * Protocol specifications indicate the range should be to 119, which | |
62 | * limits maximum year to 2099. But this range has not been checked. | |
63 | */ | |
64 | #define SMB_DATE_MAX (127<<9 | 12<<5 | 31) | |
65 | #define SMB_DATE_MIN (0<<9 | 1<<5 | 1) | |
66 | #define SMB_TIME_MAX (23<<11 | 59<<5 | 29) | |
67 | ||
1da177e4 | 68 | int cifsFYI = 0; |
1404297e | 69 | bool traceSMB; |
e7504734 | 70 | bool enable_oplocks = true; |
1404297e KC |
71 | bool linuxExtEnabled = true; |
72 | bool lookupCacheEnabled = true; | |
f92a720e | 73 | bool disable_legacy_dialects; /* false by default */ |
04912d6a | 74 | unsigned int global_secflags = CIFSSEC_DEF; |
3979877e | 75 | /* unsigned int ntlmv2_support = 0; */ |
1da177e4 | 76 | unsigned int sign_CIFS_PDUs = 1; |
ee9b6d61 | 77 | static const struct super_operations cifs_super_ops; |
1da177e4 | 78 | unsigned int CIFSMaxBufSize = CIFS_MAX_MSGSIZE; |
cb978ac8 | 79 | module_param(CIFSMaxBufSize, uint, 0444); |
11911b95 SF |
80 | MODULE_PARM_DESC(CIFSMaxBufSize, "Network buffer size (not including header) " |
81 | "for CIFS requests. " | |
63135e08 | 82 | "Default: 16384 Range: 8192 to 130048"); |
1da177e4 | 83 | unsigned int cifs_min_rcv = CIFS_MIN_RCV_POOL; |
cb978ac8 | 84 | module_param(cifs_min_rcv, uint, 0444); |
63135e08 SF |
85 | MODULE_PARM_DESC(cifs_min_rcv, "Network buffers in pool. Default: 4 Range: " |
86 | "1 to 64"); | |
1da177e4 | 87 | unsigned int cifs_min_small = 30; |
cb978ac8 | 88 | module_param(cifs_min_small, uint, 0444); |
63135e08 SF |
89 | MODULE_PARM_DESC(cifs_min_small, "Small network buffers in pool. Default: 30 " |
90 | "Range: 2 to 256"); | |
1da177e4 | 91 | unsigned int cifs_max_pending = CIFS_MAX_REQ; |
60654ce0 | 92 | module_param(cifs_max_pending, uint, 0444); |
11911b95 SF |
93 | MODULE_PARM_DESC(cifs_max_pending, "Simultaneous requests to server for " |
94 | "CIFS/SMB1 dialect (N/A for SMB3) " | |
10b9b98e | 95 | "Default: 32767 Range: 2 to 32767."); |
00778e22 SF |
96 | #ifdef CONFIG_CIFS_STATS2 |
97 | unsigned int slow_rsp_threshold = 1; | |
98 | module_param(slow_rsp_threshold, uint, 0644); | |
99 | MODULE_PARM_DESC(slow_rsp_threshold, "Amount of time (in seconds) to wait " | |
100 | "before logging that a response is delayed. " | |
101 | "Default: 1 (if set to 0 disables msg)."); | |
102 | #endif /* STATS2 */ | |
103 | ||
e7504734 | 104 | module_param(enable_oplocks, bool, 0644); |
60654ce0 | 105 | MODULE_PARM_DESC(enable_oplocks, "Enable or disable oplocks. Default: y/Y/1"); |
e7504734 | 106 | |
f92a720e SF |
107 | module_param(disable_legacy_dialects, bool, 0644); |
108 | MODULE_PARM_DESC(disable_legacy_dialects, "To improve security it may be " | |
109 | "helpful to restrict the ability to " | |
110 | "override the default dialects (SMB2.1, " | |
111 | "SMB3 and SMB3.02) on mount with old " | |
112 | "dialects (CIFS/SMB1 and SMB2) since " | |
113 | "vers=1.0 (CIFS/SMB1) and vers=2.0 are weaker" | |
114 | " and less secure. Default: n/N/0"); | |
115 | ||
1da177e4 LT |
116 | extern mempool_t *cifs_sm_req_poolp; |
117 | extern mempool_t *cifs_req_poolp; | |
118 | extern mempool_t *cifs_mid_poolp; | |
119 | ||
da472fc8 | 120 | struct workqueue_struct *cifsiod_wq; |
35cf94a3 | 121 | struct workqueue_struct *decrypt_wq; |
32546a95 | 122 | struct workqueue_struct *fileinfo_put_wq; |
3998e6b8 | 123 | struct workqueue_struct *cifsoplockd_wq; |
3d22462a | 124 | __u32 cifs_lock_secret; |
da472fc8 | 125 | |
24261fc2 MG |
126 | /* |
127 | * Bumps refcount for cifs super block. | |
128 | * Note that it should be only called if a referece to VFS super block is | |
129 | * already held, e.g. in open-type syscalls context. Otherwise it can race with | |
130 | * atomic_dec_and_test in deactivate_locked_super. | |
131 | */ | |
132 | void | |
133 | cifs_sb_active(struct super_block *sb) | |
134 | { | |
135 | struct cifs_sb_info *server = CIFS_SB(sb); | |
136 | ||
137 | if (atomic_inc_return(&server->active) == 1) | |
138 | atomic_inc(&sb->s_active); | |
139 | } | |
140 | ||
141 | void | |
142 | cifs_sb_deactive(struct super_block *sb) | |
143 | { | |
144 | struct cifs_sb_info *server = CIFS_SB(sb); | |
145 | ||
146 | if (atomic_dec_and_test(&server->active)) | |
147 | deactivate_super(sb); | |
148 | } | |
149 | ||
1da177e4 | 150 | static int |
97d1152a | 151 | cifs_read_super(struct super_block *sb) |
1da177e4 LT |
152 | { |
153 | struct inode *inode; | |
b2e5cd33 | 154 | struct cifs_sb_info *cifs_sb; |
2f6c9479 | 155 | struct cifs_tcon *tcon; |
cb7a69e6 | 156 | struct timespec64 ts; |
1da177e4 | 157 | int rc = 0; |
50c2f753 | 158 | |
b2e5cd33 | 159 | cifs_sb = CIFS_SB(sb); |
2f6c9479 | 160 | tcon = cifs_sb_master_tcon(cifs_sb); |
1da177e4 | 161 | |
2c6292ae | 162 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_POSIXACL) |
1751e8a6 | 163 | sb->s_flags |= SB_POSIXACL; |
2c6292ae | 164 | |
8a69e96e SF |
165 | if (tcon->snapshot_time) |
166 | sb->s_flags |= SB_RDONLY; | |
167 | ||
2f6c9479 | 168 | if (tcon->ses->capabilities & tcon->ses->server->vals->cap_large_files) |
2c6292ae AV |
169 | sb->s_maxbytes = MAX_LFS_FILESIZE; |
170 | else | |
171 | sb->s_maxbytes = MAX_NON_LFS; | |
172 | ||
553292a6 SF |
173 | /* |
174 | * Some very old servers like DOS and OS/2 used 2 second granularity | |
175 | * (while all current servers use 100ns granularity - see MS-DTYP) | |
176 | * but 1 second is the maximum allowed granularity for the VFS | |
177 | * so for old servers set time granularity to 1 second while for | |
178 | * everything else (current servers) set it to 100ns. | |
179 | */ | |
d4cfbf04 SF |
180 | if ((tcon->ses->server->vals->protocol_id == SMB10_PROT_ID) && |
181 | ((tcon->ses->capabilities & | |
182 | tcon->ses->server->vals->cap_nt_find) == 0) && | |
183 | !tcon->unix_ext) { | |
184 | sb->s_time_gran = 1000000000; /* 1 second is max allowed gran */ | |
185 | ts = cnvrtDosUnixTm(cpu_to_le16(SMB_DATE_MIN), 0, 0); | |
cb7a69e6 | 186 | sb->s_time_min = ts.tv_sec; |
d4cfbf04 SF |
187 | ts = cnvrtDosUnixTm(cpu_to_le16(SMB_DATE_MAX), |
188 | cpu_to_le16(SMB_TIME_MAX), 0); | |
cb7a69e6 DD |
189 | sb->s_time_max = ts.tv_sec; |
190 | } else { | |
d4cfbf04 SF |
191 | /* |
192 | * Almost every server, including all SMB2+, uses DCE TIME | |
193 | * ie 100 nanosecond units, since 1601. See MS-DTYP and MS-FSCC | |
194 | */ | |
195 | sb->s_time_gran = 100; | |
196 | ts = cifs_NTtimeToUnix(0); | |
cb7a69e6 | 197 | sb->s_time_min = ts.tv_sec; |
d4cfbf04 | 198 | ts = cifs_NTtimeToUnix(cpu_to_le64(S64_MAX)); |
cb7a69e6 DD |
199 | sb->s_time_max = ts.tv_sec; |
200 | } | |
201 | ||
1da177e4 LT |
202 | sb->s_magic = CIFS_MAGIC_NUMBER; |
203 | sb->s_op = &cifs_super_ops; | |
a9ae008f | 204 | sb->s_xattr = cifs_xattr_handlers; |
851ea086 JK |
205 | rc = super_setup_bdi(sb); |
206 | if (rc) | |
207 | goto out_no_root; | |
208 | /* tune readahead according to rsize */ | |
209 | sb->s_bdi->ra_pages = cifs_sb->rsize / PAGE_SIZE; | |
210 | ||
1da177e4 LT |
211 | sb->s_blocksize = CIFS_MAX_MSGSIZE; |
212 | sb->s_blocksize_bits = 14; /* default 2**14 = CIFS_MAX_MSGSIZE */ | |
9b6763e0 | 213 | inode = cifs_root_iget(sb); |
1da177e4 | 214 | |
ce634ab2 DH |
215 | if (IS_ERR(inode)) { |
216 | rc = PTR_ERR(inode); | |
1da177e4 LT |
217 | goto out_no_root; |
218 | } | |
219 | ||
2f6c9479 | 220 | if (tcon->nocase) |
66ffd113 JL |
221 | sb->s_d_op = &cifs_ci_dentry_ops; |
222 | else | |
223 | sb->s_d_op = &cifs_dentry_ops; | |
224 | ||
48fde701 | 225 | sb->s_root = d_make_root(inode); |
1da177e4 LT |
226 | if (!sb->s_root) { |
227 | rc = -ENOMEM; | |
228 | goto out_no_root; | |
229 | } | |
50c2f753 | 230 | |
f3a6a60e | 231 | #ifdef CONFIG_CIFS_NFSD_EXPORT |
7521a3c5 | 232 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM) { |
f96637be | 233 | cifs_dbg(FYI, "export ops supported\n"); |
7521a3c5 SF |
234 | sb->s_export_op = &cifs_export_ops; |
235 | } | |
f3a6a60e | 236 | #endif /* CONFIG_CIFS_NFSD_EXPORT */ |
1da177e4 LT |
237 | |
238 | return 0; | |
239 | ||
240 | out_no_root: | |
f96637be | 241 | cifs_dbg(VFS, "%s: get root inode failed\n", __func__); |
1da177e4 LT |
242 | return rc; |
243 | } | |
244 | ||
6d686175 AV |
245 | static void cifs_kill_sb(struct super_block *sb) |
246 | { | |
247 | struct cifs_sb_info *cifs_sb = CIFS_SB(sb); | |
248 | kill_anon_super(sb); | |
98ab494d | 249 | cifs_umount(cifs_sb); |
1da177e4 LT |
250 | } |
251 | ||
252 | static int | |
726c3342 | 253 | cifs_statfs(struct dentry *dentry, struct kstatfs *buf) |
1da177e4 | 254 | { |
726c3342 | 255 | struct super_block *sb = dentry->d_sb; |
39da9847 | 256 | struct cifs_sb_info *cifs_sb = CIFS_SB(sb); |
96daf2b0 | 257 | struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb); |
76ec5e33 | 258 | struct TCP_Server_Info *server = tcon->ses->server; |
6d5786a3 | 259 | unsigned int xid; |
76ec5e33 | 260 | int rc = 0; |
1da177e4 | 261 | |
6d5786a3 | 262 | xid = get_xid(); |
1da177e4 | 263 | |
21ba3845 SF |
264 | if (le32_to_cpu(tcon->fsAttrInfo.MaxPathNameComponentLength) > 0) |
265 | buf->f_namelen = | |
266 | le32_to_cpu(tcon->fsAttrInfo.MaxPathNameComponentLength); | |
267 | else | |
268 | buf->f_namelen = PATH_MAX; | |
269 | ||
270 | buf->f_fsid.val[0] = tcon->vol_serial_number; | |
271 | /* are using part of create time for more randomness, see man statfs */ | |
272 | buf->f_fsid.val[1] = (int)le64_to_cpu(tcon->vol_create_time); | |
273 | ||
1da177e4 LT |
274 | buf->f_files = 0; /* undefined */ |
275 | buf->f_ffree = 0; /* unlimited */ | |
276 | ||
76ec5e33 | 277 | if (server->ops->queryfs) |
0f060936 | 278 | rc = server->ops->queryfs(xid, tcon, cifs_sb, buf); |
39da9847 | 279 | |
6d5786a3 | 280 | free_xid(xid); |
39da9847 | 281 | return 0; |
1da177e4 LT |
282 | } |
283 | ||
31742c5a SF |
284 | static long cifs_fallocate(struct file *file, int mode, loff_t off, loff_t len) |
285 | { | |
7119e220 | 286 | struct cifs_sb_info *cifs_sb = CIFS_FILE_SB(file); |
31742c5a SF |
287 | struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb); |
288 | struct TCP_Server_Info *server = tcon->ses->server; | |
289 | ||
290 | if (server->ops->fallocate) | |
291 | return server->ops->fallocate(file, tcon, mode, off, len); | |
292 | ||
293 | return -EOPNOTSUPP; | |
294 | } | |
295 | ||
10556cb2 | 296 | static int cifs_permission(struct inode *inode, int mask) |
1da177e4 LT |
297 | { |
298 | struct cifs_sb_info *cifs_sb; | |
299 | ||
300 | cifs_sb = CIFS_SB(inode->i_sb); | |
301 | ||
f696a365 MS |
302 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_PERM) { |
303 | if ((mask & MAY_EXEC) && !execute_ok(inode)) | |
304 | return -EACCES; | |
305 | else | |
306 | return 0; | |
307 | } else /* file mode might have been restricted at mount time | |
50c2f753 | 308 | on the client (above and beyond ACL on servers) for |
1da177e4 | 309 | servers which do not support setting and viewing mode bits, |
50c2f753 | 310 | so allowing client to check permissions is useful */ |
2830ba7f | 311 | return generic_permission(inode, mask); |
1da177e4 LT |
312 | } |
313 | ||
e18b890b CL |
314 | static struct kmem_cache *cifs_inode_cachep; |
315 | static struct kmem_cache *cifs_req_cachep; | |
316 | static struct kmem_cache *cifs_mid_cachep; | |
e18b890b | 317 | static struct kmem_cache *cifs_sm_req_cachep; |
1da177e4 LT |
318 | mempool_t *cifs_sm_req_poolp; |
319 | mempool_t *cifs_req_poolp; | |
320 | mempool_t *cifs_mid_poolp; | |
321 | ||
322 | static struct inode * | |
323 | cifs_alloc_inode(struct super_block *sb) | |
324 | { | |
325 | struct cifsInodeInfo *cifs_inode; | |
e94b1766 | 326 | cifs_inode = kmem_cache_alloc(cifs_inode_cachep, GFP_KERNEL); |
1da177e4 LT |
327 | if (!cifs_inode) |
328 | return NULL; | |
329 | cifs_inode->cifsAttrs = 0x20; /* default */ | |
1da177e4 | 330 | cifs_inode->time = 0; |
b8c32dbb PS |
331 | /* |
332 | * Until the file is open and we have gotten oplock info back from the | |
333 | * server, can not assume caching of file data or metadata. | |
334 | */ | |
c6723628 | 335 | cifs_set_oplock_level(cifs_inode, 0); |
aff8d5ca | 336 | cifs_inode->flags = 0; |
c11f1df5 SP |
337 | spin_lock_init(&cifs_inode->writers_lock); |
338 | cifs_inode->writers = 0; | |
1da177e4 | 339 | cifs_inode->vfs_inode.i_blkbits = 14; /* 2**14 = CIFS_MAX_MSGSIZE */ |
fbec9ab9 | 340 | cifs_inode->server_eof = 0; |
20054bd6 JL |
341 | cifs_inode->uniqueid = 0; |
342 | cifs_inode->createtime = 0; | |
42873b0a | 343 | cifs_inode->epoch = 0; |
487317c9 | 344 | spin_lock_init(&cifs_inode->open_file_lock); |
fa70b87c | 345 | generate_random_uuid(cifs_inode->lease_key); |
2a38e120 | 346 | |
b8c32dbb PS |
347 | /* |
348 | * Can not set i_flags here - they get immediately overwritten to zero | |
349 | * by the VFS. | |
350 | */ | |
351 | /* cifs_inode->vfs_inode.i_flags = S_NOATIME | S_NOCMTIME; */ | |
1da177e4 | 352 | INIT_LIST_HEAD(&cifs_inode->openFileList); |
f45d3416 | 353 | INIT_LIST_HEAD(&cifs_inode->llist); |
1da177e4 LT |
354 | return &cifs_inode->vfs_inode; |
355 | } | |
356 | ||
357 | static void | |
c2e6802e | 358 | cifs_free_inode(struct inode *inode) |
1da177e4 | 359 | { |
c2e6802e | 360 | kmem_cache_free(cifs_inode_cachep, CIFS_I(inode)); |
1da177e4 LT |
361 | } |
362 | ||
9451a9a5 | 363 | static void |
b57922d9 | 364 | cifs_evict_inode(struct inode *inode) |
9451a9a5 | 365 | { |
91b0abe3 | 366 | truncate_inode_pages_final(&inode->i_data); |
dbd5768f | 367 | clear_inode(inode); |
9451a9a5 SJ |
368 | cifs_fscache_release_inode_cookie(inode); |
369 | } | |
370 | ||
61f98ffd JL |
371 | static void |
372 | cifs_show_address(struct seq_file *s, struct TCP_Server_Info *server) | |
373 | { | |
a9f1b85e PS |
374 | struct sockaddr_in *sa = (struct sockaddr_in *) &server->dstaddr; |
375 | struct sockaddr_in6 *sa6 = (struct sockaddr_in6 *) &server->dstaddr; | |
376 | ||
571d5972 | 377 | seq_puts(s, ",addr="); |
61f98ffd | 378 | |
a9f1b85e | 379 | switch (server->dstaddr.ss_family) { |
61f98ffd | 380 | case AF_INET: |
a9f1b85e | 381 | seq_printf(s, "%pI4", &sa->sin_addr.s_addr); |
61f98ffd JL |
382 | break; |
383 | case AF_INET6: | |
a9f1b85e PS |
384 | seq_printf(s, "%pI6", &sa6->sin6_addr.s6_addr); |
385 | if (sa6->sin6_scope_id) | |
386 | seq_printf(s, "%%%u", sa6->sin6_scope_id); | |
61f98ffd JL |
387 | break; |
388 | default: | |
571d5972 | 389 | seq_puts(s, "(unknown)"); |
61f98ffd | 390 | } |
8339dd32 LL |
391 | if (server->rdma) |
392 | seq_puts(s, ",rdma"); | |
61f98ffd JL |
393 | } |
394 | ||
3e715513 | 395 | static void |
28e11bd8 | 396 | cifs_show_security(struct seq_file *s, struct cifs_ses *ses) |
3e715513 | 397 | { |
eda2116f SF |
398 | if (ses->sectype == Unspecified) { |
399 | if (ses->user_name == NULL) | |
400 | seq_puts(s, ",sec=none"); | |
28e11bd8 | 401 | return; |
eda2116f | 402 | } |
28e11bd8 | 403 | |
571d5972 | 404 | seq_puts(s, ",sec="); |
3e715513 | 405 | |
28e11bd8 | 406 | switch (ses->sectype) { |
3e715513 | 407 | case LANMAN: |
571d5972 | 408 | seq_puts(s, "lanman"); |
3e715513 JL |
409 | break; |
410 | case NTLMv2: | |
571d5972 | 411 | seq_puts(s, "ntlmv2"); |
3e715513 JL |
412 | break; |
413 | case NTLM: | |
571d5972 | 414 | seq_puts(s, "ntlm"); |
3e715513 JL |
415 | break; |
416 | case Kerberos: | |
3f6166aa | 417 | seq_puts(s, "krb5"); |
3e715513 JL |
418 | break; |
419 | case RawNTLMSSP: | |
571d5972 | 420 | seq_puts(s, "ntlmssp"); |
3e715513 JL |
421 | break; |
422 | default: | |
423 | /* shouldn't ever happen */ | |
571d5972 | 424 | seq_puts(s, "unknown"); |
3e715513 JL |
425 | break; |
426 | } | |
427 | ||
28e11bd8 | 428 | if (ses->sign) |
571d5972 | 429 | seq_puts(s, "i"); |
3f6166aa PP |
430 | |
431 | if (ses->sectype == Kerberos) | |
432 | seq_printf(s, ",cruid=%u", | |
433 | from_kuid_munged(&init_user_ns, ses->cred_uid)); | |
3e715513 JL |
434 | } |
435 | ||
d06b5056 JL |
436 | static void |
437 | cifs_show_cache_flavor(struct seq_file *s, struct cifs_sb_info *cifs_sb) | |
438 | { | |
571d5972 | 439 | seq_puts(s, ",cache="); |
d06b5056 JL |
440 | |
441 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_STRICT_IO) | |
571d5972 | 442 | seq_puts(s, "strict"); |
d06b5056 | 443 | else if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DIRECT_IO) |
571d5972 | 444 | seq_puts(s, "none"); |
41e033fe SF |
445 | else if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_RW_CACHE) |
446 | seq_puts(s, "singleclient"); /* assume only one client access */ | |
83bbfa70 SF |
447 | else if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_RO_CACHE) |
448 | seq_puts(s, "ro"); /* read only caching assumed */ | |
d06b5056 | 449 | else |
571d5972 | 450 | seq_puts(s, "loose"); |
d06b5056 JL |
451 | } |
452 | ||
3ae35cde JL |
453 | static void |
454 | cifs_show_nls(struct seq_file *s, struct nls_table *cur) | |
455 | { | |
456 | struct nls_table *def; | |
457 | ||
458 | /* Display iocharset= option if it's not default charset */ | |
459 | def = load_nls_default(); | |
460 | if (def != cur) | |
461 | seq_printf(s, ",iocharset=%s", cur->charset); | |
462 | unload_nls(def); | |
463 | } | |
464 | ||
1da177e4 LT |
465 | /* |
466 | * cifs_show_options() is for displaying mount options in /proc/mounts. | |
467 | * Not all settable options are displayed but most of the important | |
468 | * ones are. | |
469 | */ | |
470 | static int | |
34c80b1d | 471 | cifs_show_options(struct seq_file *s, struct dentry *root) |
1da177e4 | 472 | { |
34c80b1d | 473 | struct cifs_sb_info *cifs_sb = CIFS_SB(root->d_sb); |
96daf2b0 | 474 | struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb); |
3eb9a889 BG |
475 | struct sockaddr *srcaddr; |
476 | srcaddr = (struct sockaddr *)&tcon->ses->server->srcaddr; | |
8616e0fc | 477 | |
a068acf2 | 478 | seq_show_option(s, "vers", tcon->ses->server->vals->version_string); |
28e11bd8 | 479 | cifs_show_security(s, tcon->ses); |
d06b5056 | 480 | cifs_show_cache_flavor(s, cifs_sb); |
3e715513 | 481 | |
3e7a02d4 SF |
482 | if (tcon->no_lease) |
483 | seq_puts(s, ",nolease"); | |
29e07c82 | 484 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MULTIUSER) |
571d5972 | 485 | seq_puts(s, ",multiuser"); |
8727c8a8 | 486 | else if (tcon->ses->user_name) |
a068acf2 | 487 | seq_show_option(s, "username", tcon->ses->user_name); |
29e07c82 | 488 | |
e55954a5 | 489 | if (tcon->ses->domainName && tcon->ses->domainName[0] != 0) |
a068acf2 | 490 | seq_show_option(s, "domain", tcon->ses->domainName); |
8616e0fc | 491 | |
3eb9a889 BG |
492 | if (srcaddr->sa_family != AF_UNSPEC) { |
493 | struct sockaddr_in *saddr4; | |
494 | struct sockaddr_in6 *saddr6; | |
495 | saddr4 = (struct sockaddr_in *)srcaddr; | |
496 | saddr6 = (struct sockaddr_in6 *)srcaddr; | |
497 | if (srcaddr->sa_family == AF_INET6) | |
498 | seq_printf(s, ",srcaddr=%pI6c", | |
499 | &saddr6->sin6_addr); | |
500 | else if (srcaddr->sa_family == AF_INET) | |
501 | seq_printf(s, ",srcaddr=%pI4", | |
502 | &saddr4->sin_addr.s_addr); | |
503 | else | |
504 | seq_printf(s, ",srcaddr=BAD-AF:%i", | |
505 | (int)(srcaddr->sa_family)); | |
506 | } | |
507 | ||
1f68233c EB |
508 | seq_printf(s, ",uid=%u", |
509 | from_kuid_munged(&init_user_ns, cifs_sb->mnt_uid)); | |
340481a3 | 510 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_UID) |
571d5972 | 511 | seq_puts(s, ",forceuid"); |
4486d6ed | 512 | else |
571d5972 | 513 | seq_puts(s, ",noforceuid"); |
340481a3 | 514 | |
1f68233c EB |
515 | seq_printf(s, ",gid=%u", |
516 | from_kgid_munged(&init_user_ns, cifs_sb->mnt_gid)); | |
340481a3 | 517 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_GID) |
571d5972 | 518 | seq_puts(s, ",forcegid"); |
4486d6ed | 519 | else |
571d5972 | 520 | seq_puts(s, ",noforcegid"); |
8616e0fc | 521 | |
61f98ffd | 522 | cifs_show_address(s, tcon->ses->server); |
1da177e4 | 523 | |
8616e0fc | 524 | if (!tcon->unix_ext) |
5206efd6 | 525 | seq_printf(s, ",file_mode=0%ho,dir_mode=0%ho", |
2b280fab SF |
526 | cifs_sb->mnt_file_mode, |
527 | cifs_sb->mnt_dir_mode); | |
3ae35cde JL |
528 | |
529 | cifs_show_nls(s, cifs_sb->local_nls); | |
530 | ||
8616e0fc | 531 | if (tcon->seal) |
571d5972 | 532 | seq_puts(s, ",seal"); |
ec57010a SF |
533 | else if (tcon->ses->server->ignore_signature) |
534 | seq_puts(s, ",signloosely"); | |
8616e0fc | 535 | if (tcon->nocase) |
571d5972 | 536 | seq_puts(s, ",nocase"); |
82e9367c SF |
537 | if (tcon->nodelete) |
538 | seq_puts(s, ",nodelete"); | |
c8b6ac1a K |
539 | if (tcon->local_lease) |
540 | seq_puts(s, ",locallease"); | |
8616e0fc | 541 | if (tcon->retry) |
571d5972 | 542 | seq_puts(s, ",hard"); |
6e82e929 RS |
543 | else |
544 | seq_puts(s, ",soft"); | |
f16dfa7c SF |
545 | if (tcon->use_persistent) |
546 | seq_puts(s, ",persistenthandles"); | |
592fafe6 SF |
547 | else if (tcon->use_resilient) |
548 | seq_puts(s, ",resilienthandles"); | |
b326614e SF |
549 | if (tcon->posix_extensions) |
550 | seq_puts(s, ",posix"); | |
551 | else if (tcon->unix_ext) | |
552 | seq_puts(s, ",unix"); | |
553 | else | |
554 | seq_puts(s, ",nounix"); | |
8393072b AA |
555 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_DFS) |
556 | seq_puts(s, ",nodfs"); | |
8616e0fc | 557 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_POSIX_PATHS) |
571d5972 | 558 | seq_puts(s, ",posixpaths"); |
8616e0fc | 559 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID) |
571d5972 | 560 | seq_puts(s, ",setuids"); |
95932655 SF |
561 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_UID_FROM_ACL) |
562 | seq_puts(s, ",idsfromsid"); | |
8616e0fc | 563 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM) |
571d5972 | 564 | seq_puts(s, ",serverino"); |
d4ffff1f | 565 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_RWPIDFORWARD) |
571d5972 | 566 | seq_puts(s, ",rwpidforward"); |
d4ffff1f | 567 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NOPOSIXBRL) |
571d5972 | 568 | seq_puts(s, ",forcemand"); |
8616e0fc | 569 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_XATTR) |
571d5972 | 570 | seq_puts(s, ",nouser_xattr"); |
8616e0fc | 571 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MAP_SPECIAL_CHR) |
571d5972 | 572 | seq_puts(s, ",mapchars"); |
bc8ebdc4 NA |
573 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MAP_SFM_CHR) |
574 | seq_puts(s, ",mapposix"); | |
8616e0fc | 575 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_UNX_EMUL) |
571d5972 | 576 | seq_puts(s, ",sfu"); |
8616e0fc | 577 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_BRL) |
571d5972 | 578 | seq_puts(s, ",nobrl"); |
3d4ef9a1 SF |
579 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_HANDLE_CACHE) |
580 | seq_puts(s, ",nohandlecache"); | |
412094a8 SF |
581 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MODE_FROM_SID) |
582 | seq_puts(s, ",modefromsid"); | |
8616e0fc | 583 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) |
571d5972 | 584 | seq_puts(s, ",cifsacl"); |
8616e0fc | 585 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM) |
571d5972 | 586 | seq_puts(s, ",dynperm"); |
1751e8a6 | 587 | if (root->d_sb->s_flags & SB_POSIXACL) |
571d5972 | 588 | seq_puts(s, ",acl"); |
736a3320 | 589 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MF_SYMLINKS) |
571d5972 | 590 | seq_puts(s, ",mfsymlinks"); |
476428f8 | 591 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_FSCACHE) |
571d5972 | 592 | seq_puts(s, ",fsc"); |
71c424ba | 593 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NOSSYNC) |
571d5972 | 594 | seq_puts(s, ",nostrictsync"); |
71c424ba | 595 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_PERM) |
571d5972 | 596 | seq_puts(s, ",noperm"); |
3c7c87fd | 597 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_BACKUPUID) |
1f68233c EB |
598 | seq_printf(s, ",backupuid=%u", |
599 | from_kuid_munged(&init_user_ns, | |
600 | cifs_sb->mnt_backupuid)); | |
3c7c87fd | 601 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_BACKUPGID) |
1f68233c EB |
602 | seq_printf(s, ",backupgid=%u", |
603 | from_kgid_munged(&init_user_ns, | |
604 | cifs_sb->mnt_backupgid)); | |
8616e0fc | 605 | |
28f88810 SP |
606 | seq_printf(s, ",rsize=%u", cifs_sb->rsize); |
607 | seq_printf(s, ",wsize=%u", cifs_sb->wsize); | |
e8506d25 | 608 | seq_printf(s, ",bsize=%u", cifs_sb->bsize); |
563317ec SF |
609 | if (tcon->ses->server->min_offload) |
610 | seq_printf(s, ",esize=%u", tcon->ses->server->min_offload); | |
adfeb3e0 SF |
611 | seq_printf(s, ",echo_interval=%lu", |
612 | tcon->ses->server->echo_interval / HZ); | |
dc179268 SF |
613 | |
614 | /* Only display max_credits if it was overridden on mount */ | |
615 | if (tcon->ses->server->max_credits != SMB2_MAX_CREDITS_AVAILABLE) | |
616 | seq_printf(s, ",max_credits=%u", tcon->ses->server->max_credits); | |
617 | ||
8a69e96e SF |
618 | if (tcon->snapshot_time) |
619 | seq_printf(s, ",snapshot=%llu", tcon->snapshot_time); | |
ca567eb2 SF |
620 | if (tcon->handle_timeout) |
621 | seq_printf(s, ",handletimeout=%u", tcon->handle_timeout); | |
6d20e840 | 622 | /* convert actimeo and display it in seconds */ |
156d1790 | 623 | seq_printf(s, ",actimeo=%lu", cifs_sb->actimeo / HZ); |
8616e0fc | 624 | |
bcc88801 | 625 | if (tcon->ses->chan_max > 1) |
7866c177 | 626 | seq_printf(s, ",multichannel,max_channels=%zu", |
bcc88801 AA |
627 | tcon->ses->chan_max); |
628 | ||
1da177e4 LT |
629 | return 0; |
630 | } | |
631 | ||
42faad99 | 632 | static void cifs_umount_begin(struct super_block *sb) |
68058e75 | 633 | { |
42faad99 | 634 | struct cifs_sb_info *cifs_sb = CIFS_SB(sb); |
96daf2b0 | 635 | struct cifs_tcon *tcon; |
68058e75 | 636 | |
4523cc30 | 637 | if (cifs_sb == NULL) |
9e2e85f8 SF |
638 | return; |
639 | ||
0d424ad0 | 640 | tcon = cifs_sb_master_tcon(cifs_sb); |
f1987b44 | 641 | |
3f9bcca7 | 642 | spin_lock(&cifs_tcp_ses_lock); |
ad8034f1 SF |
643 | if ((tcon->tc_count > 1) || (tcon->tidStatus == CifsExiting)) { |
644 | /* we have other mounts to same share or we have | |
645 | already tried to force umount this and woken up | |
646 | all waiting network requests, nothing to do */ | |
3f9bcca7 | 647 | spin_unlock(&cifs_tcp_ses_lock); |
ad8034f1 SF |
648 | return; |
649 | } else if (tcon->tc_count == 1) | |
5e1253b5 | 650 | tcon->tidStatus = CifsExiting; |
3f9bcca7 | 651 | spin_unlock(&cifs_tcp_ses_lock); |
5e1253b5 | 652 | |
3a5ff61c | 653 | /* cancel_brl_requests(tcon); */ /* BB mark all brl mids as exiting */ |
7b7abfe3 | 654 | /* cancel_notify_requests(tcon); */ |
50c2f753 | 655 | if (tcon->ses && tcon->ses->server) { |
f96637be | 656 | cifs_dbg(FYI, "wake up tasks now - umount begin not complete\n"); |
9e2e85f8 | 657 | wake_up_all(&tcon->ses->server->request_q); |
6ab16d24 SF |
658 | wake_up_all(&tcon->ses->server->response_q); |
659 | msleep(1); /* yield */ | |
660 | /* we have to kick the requests once more */ | |
661 | wake_up_all(&tcon->ses->server->response_q); | |
662 | msleep(1); | |
5e1253b5 | 663 | } |
68058e75 SF |
664 | |
665 | return; | |
666 | } | |
68058e75 | 667 | |
bf97d287 | 668 | #ifdef CONFIG_CIFS_STATS2 |
64132379 | 669 | static int cifs_show_stats(struct seq_file *s, struct dentry *root) |
bf97d287 SF |
670 | { |
671 | /* BB FIXME */ | |
672 | return 0; | |
673 | } | |
674 | #endif | |
675 | ||
1da177e4 LT |
676 | static int cifs_remount(struct super_block *sb, int *flags, char *data) |
677 | { | |
02b9984d | 678 | sync_filesystem(sb); |
1751e8a6 | 679 | *flags |= SB_NODIRATIME; |
1da177e4 LT |
680 | return 0; |
681 | } | |
682 | ||
45321ac5 | 683 | static int cifs_drop_inode(struct inode *inode) |
12420ac3 JL |
684 | { |
685 | struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb); | |
686 | ||
45321ac5 AV |
687 | /* no serverino => unconditional eviction */ |
688 | return !(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM) || | |
689 | generic_drop_inode(inode); | |
12420ac3 JL |
690 | } |
691 | ||
ee9b6d61 | 692 | static const struct super_operations cifs_super_ops = { |
1da177e4 LT |
693 | .statfs = cifs_statfs, |
694 | .alloc_inode = cifs_alloc_inode, | |
c2e6802e | 695 | .free_inode = cifs_free_inode, |
12420ac3 | 696 | .drop_inode = cifs_drop_inode, |
b57922d9 | 697 | .evict_inode = cifs_evict_inode, |
12420ac3 JL |
698 | /* .delete_inode = cifs_delete_inode, */ /* Do not need above |
699 | function unless later we add lazy close of inodes or unless the | |
50c2f753 SF |
700 | kernel forgets to call us with the same number of releases (closes) |
701 | as opens */ | |
1da177e4 | 702 | .show_options = cifs_show_options, |
7b7abfe3 | 703 | .umount_begin = cifs_umount_begin, |
1da177e4 | 704 | .remount_fs = cifs_remount, |
bf97d287 | 705 | #ifdef CONFIG_CIFS_STATS2 |
f46d3e11 | 706 | .show_stats = cifs_show_stats, |
bf97d287 | 707 | #endif |
1da177e4 LT |
708 | }; |
709 | ||
f87d39d9 SF |
710 | /* |
711 | * Get root dentry from superblock according to prefix path mount option. | |
712 | * Return dentry with refcount + 1 on success and NULL otherwise. | |
713 | */ | |
714 | static struct dentry * | |
715 | cifs_get_root(struct smb_vol *vol, struct super_block *sb) | |
716 | { | |
fec11dd9 | 717 | struct dentry *dentry; |
f87d39d9 | 718 | struct cifs_sb_info *cifs_sb = CIFS_SB(sb); |
fec11dd9 AV |
719 | char *full_path = NULL; |
720 | char *s, *p; | |
f87d39d9 SF |
721 | char sep; |
722 | ||
348c1bfa SP |
723 | if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_USE_PREFIX_PATH) |
724 | return dget(sb->s_root); | |
725 | ||
6d3ea7e4 | 726 | full_path = cifs_build_path_to_root(vol, cifs_sb, |
374402a2 | 727 | cifs_sb_master_tcon(cifs_sb), 0); |
f87d39d9 | 728 | if (full_path == NULL) |
9403c9c5 | 729 | return ERR_PTR(-ENOMEM); |
f87d39d9 | 730 | |
f96637be | 731 | cifs_dbg(FYI, "Get root dentry for %s\n", full_path); |
f87d39d9 | 732 | |
f87d39d9 | 733 | sep = CIFS_DIR_SEP(cifs_sb); |
fec11dd9 AV |
734 | dentry = dget(sb->s_root); |
735 | p = s = full_path; | |
736 | ||
737 | do { | |
2b0143b5 | 738 | struct inode *dir = d_inode(dentry); |
fec11dd9 AV |
739 | struct dentry *child; |
740 | ||
ce2ac521 JL |
741 | if (!S_ISDIR(dir->i_mode)) { |
742 | dput(dentry); | |
743 | dentry = ERR_PTR(-ENOTDIR); | |
744 | break; | |
745 | } | |
5b980b01 | 746 | |
fec11dd9 AV |
747 | /* skip separators */ |
748 | while (*s == sep) | |
749 | s++; | |
750 | if (!*s) | |
751 | break; | |
752 | p = s++; | |
753 | /* next separator */ | |
754 | while (*s && *s != sep) | |
755 | s++; | |
756 | ||
6c2d4798 | 757 | child = lookup_positive_unlocked(p, dentry, s - p); |
fec11dd9 AV |
758 | dput(dentry); |
759 | dentry = child; | |
760 | } while (!IS_ERR(dentry)); | |
f87d39d9 | 761 | kfree(full_path); |
fec11dd9 | 762 | return dentry; |
f87d39d9 SF |
763 | } |
764 | ||
ee01a14d AV |
765 | static int cifs_set_super(struct super_block *sb, void *data) |
766 | { | |
767 | struct cifs_mnt_data *mnt_data = data; | |
768 | sb->s_fs_info = mnt_data->cifs_sb; | |
769 | return set_anon_super(sb, NULL); | |
770 | } | |
771 | ||
d753ed97 | 772 | static struct dentry * |
c7c137b9 SF |
773 | cifs_smb3_do_mount(struct file_system_type *fs_type, |
774 | int flags, const char *dev_name, void *data, bool is_smb3) | |
1da177e4 LT |
775 | { |
776 | int rc; | |
db719222 | 777 | struct super_block *sb; |
724d9f1c PS |
778 | struct cifs_sb_info *cifs_sb; |
779 | struct smb_vol *volume_info; | |
25c7f41e | 780 | struct cifs_mnt_data mnt_data; |
724d9f1c | 781 | struct dentry *root; |
1da177e4 | 782 | |
8c1beb98 SF |
783 | /* |
784 | * Prints in Kernel / CIFS log the attempted mount operation | |
785 | * If CIFS_DEBUG && cifs_FYI | |
786 | */ | |
f80eaedd RF |
787 | if (cifsFYI) |
788 | cifs_dbg(FYI, "Devname: %s flags: %d\n", dev_name, flags); | |
789 | else | |
790 | cifs_info("Attempting to mount %s\n", dev_name); | |
1da177e4 | 791 | |
c7c137b9 | 792 | volume_info = cifs_get_volume_info((char *)data, dev_name, is_smb3); |
04db79b0 JL |
793 | if (IS_ERR(volume_info)) |
794 | return ERR_CAST(volume_info); | |
724d9f1c PS |
795 | |
796 | cifs_sb = kzalloc(sizeof(struct cifs_sb_info), GFP_KERNEL); | |
797 | if (cifs_sb == NULL) { | |
798 | root = ERR_PTR(-ENOMEM); | |
5c4f1ad7 | 799 | goto out_nls; |
724d9f1c PS |
800 | } |
801 | ||
5d3bc605 AV |
802 | cifs_sb->mountdata = kstrndup(data, PAGE_SIZE, GFP_KERNEL); |
803 | if (cifs_sb->mountdata == NULL) { | |
804 | root = ERR_PTR(-ENOMEM); | |
4214ebf4 | 805 | goto out_free; |
5d3bc605 AV |
806 | } |
807 | ||
4214ebf4 SP |
808 | rc = cifs_setup_cifs_sb(volume_info, cifs_sb); |
809 | if (rc) { | |
810 | root = ERR_PTR(rc); | |
811 | goto out_free; | |
a6b5058f AA |
812 | } |
813 | ||
97d1152a AV |
814 | rc = cifs_mount(cifs_sb, volume_info); |
815 | if (rc) { | |
1751e8a6 | 816 | if (!(flags & SB_SILENT)) |
f96637be JP |
817 | cifs_dbg(VFS, "cifs_mount failed w/return code = %d\n", |
818 | rc); | |
97d1152a | 819 | root = ERR_PTR(rc); |
4214ebf4 | 820 | goto out_free; |
97d1152a AV |
821 | } |
822 | ||
25c7f41e PS |
823 | mnt_data.vol = volume_info; |
824 | mnt_data.cifs_sb = cifs_sb; | |
825 | mnt_data.flags = flags; | |
826 | ||
9249e17f | 827 | /* BB should we make this contingent on mount parm? */ |
1751e8a6 | 828 | flags |= SB_NODIRATIME | SB_NOATIME; |
9249e17f DH |
829 | |
830 | sb = sget(fs_type, cifs_match_super, cifs_set_super, flags, &mnt_data); | |
724d9f1c | 831 | if (IS_ERR(sb)) { |
724d9f1c | 832 | root = ERR_CAST(sb); |
97d1152a | 833 | cifs_umount(cifs_sb); |
d757d71b | 834 | goto out; |
724d9f1c | 835 | } |
1da177e4 | 836 | |
ee01a14d | 837 | if (sb->s_root) { |
f96637be | 838 | cifs_dbg(FYI, "Use existing superblock\n"); |
97d1152a | 839 | cifs_umount(cifs_sb); |
5c4f1ad7 | 840 | } else { |
5c4f1ad7 AV |
841 | rc = cifs_read_super(sb); |
842 | if (rc) { | |
843 | root = ERR_PTR(rc); | |
844 | goto out_super; | |
845 | } | |
b2e5cd33 | 846 | |
1751e8a6 | 847 | sb->s_flags |= SB_ACTIVE; |
1da177e4 | 848 | } |
724d9f1c | 849 | |
348c1bfa | 850 | root = cifs_get_root(volume_info, sb); |
9403c9c5 | 851 | if (IS_ERR(root)) |
f87d39d9 | 852 | goto out_super; |
25c7f41e | 853 | |
f96637be | 854 | cifs_dbg(FYI, "dentry root is: %p\n", root); |
641a58d6 | 855 | goto out; |
724d9f1c | 856 | |
641a58d6 | 857 | out_super: |
641a58d6 | 858 | deactivate_locked_super(sb); |
641a58d6 | 859 | out: |
f9e59bcb | 860 | cifs_cleanup_volume_info(volume_info); |
724d9f1c | 861 | return root; |
5c4f1ad7 | 862 | |
4214ebf4 SP |
863 | out_free: |
864 | kfree(cifs_sb->prepath); | |
5c4f1ad7 | 865 | kfree(cifs_sb->mountdata); |
5c4f1ad7 AV |
866 | kfree(cifs_sb); |
867 | out_nls: | |
868 | unload_nls(volume_info->local_nls); | |
869 | goto out; | |
1da177e4 LT |
870 | } |
871 | ||
c7c137b9 SF |
872 | static struct dentry * |
873 | smb3_do_mount(struct file_system_type *fs_type, | |
874 | int flags, const char *dev_name, void *data) | |
875 | { | |
876 | return cifs_smb3_do_mount(fs_type, flags, dev_name, data, true); | |
877 | } | |
878 | ||
879 | static struct dentry * | |
880 | cifs_do_mount(struct file_system_type *fs_type, | |
881 | int flags, const char *dev_name, void *data) | |
882 | { | |
883 | return cifs_smb3_do_mount(fs_type, flags, dev_name, data, false); | |
884 | } | |
885 | ||
08bc0353 JL |
886 | static ssize_t |
887 | cifs_loose_read_iter(struct kiocb *iocb, struct iov_iter *iter) | |
888 | { | |
889 | ssize_t rc; | |
890 | struct inode *inode = file_inode(iocb->ki_filp); | |
891 | ||
882137c4 RL |
892 | if (iocb->ki_filp->f_flags & O_DIRECT) |
893 | return cifs_user_readv(iocb, iter); | |
894 | ||
08bc0353 JL |
895 | rc = cifs_revalidate_mapping(inode); |
896 | if (rc) | |
897 | return rc; | |
898 | ||
899 | return generic_file_read_iter(iocb, iter); | |
900 | } | |
901 | ||
3dae8750 | 902 | static ssize_t cifs_file_write_iter(struct kiocb *iocb, struct iov_iter *from) |
1da177e4 | 903 | { |
496ad9aa | 904 | struct inode *inode = file_inode(iocb->ki_filp); |
c11f1df5 | 905 | struct cifsInodeInfo *cinode = CIFS_I(inode); |
1da177e4 | 906 | ssize_t written; |
72432ffc | 907 | int rc; |
1da177e4 | 908 | |
882137c4 RL |
909 | if (iocb->ki_filp->f_flags & O_DIRECT) { |
910 | written = cifs_user_writev(iocb, from); | |
911 | if (written > 0 && CIFS_CACHE_READ(cinode)) { | |
912 | cifs_zap_mapping(inode); | |
913 | cifs_dbg(FYI, | |
914 | "Set no oplock for inode=%p after a write operation\n", | |
915 | inode); | |
916 | cinode->oplock = 0; | |
917 | } | |
918 | return written; | |
919 | } | |
920 | ||
c11f1df5 SP |
921 | written = cifs_get_writer(cinode); |
922 | if (written) | |
923 | return written; | |
924 | ||
3dae8750 | 925 | written = generic_file_write_iter(iocb, from); |
72432ffc | 926 | |
18cceb6a | 927 | if (CIFS_CACHE_WRITE(CIFS_I(inode))) |
c11f1df5 | 928 | goto out; |
72432ffc PS |
929 | |
930 | rc = filemap_fdatawrite(inode->i_mapping); | |
931 | if (rc) | |
3dae8750 | 932 | cifs_dbg(FYI, "cifs_file_write_iter: %d rc on %p inode\n", |
f96637be | 933 | rc, inode); |
72432ffc | 934 | |
c11f1df5 SP |
935 | out: |
936 | cifs_put_writer(cinode); | |
1da177e4 LT |
937 | return written; |
938 | } | |
939 | ||
965c8e59 | 940 | static loff_t cifs_llseek(struct file *file, loff_t offset, int whence) |
c32a0b68 | 941 | { |
dece44e3 RS |
942 | struct cifsFileInfo *cfile = file->private_data; |
943 | struct cifs_tcon *tcon; | |
944 | ||
06222e49 | 945 | /* |
965c8e59 | 946 | * whence == SEEK_END || SEEK_DATA || SEEK_HOLE => we must revalidate |
06222e49 JB |
947 | * the cached file length |
948 | */ | |
965c8e59 | 949 | if (whence != SEEK_SET && whence != SEEK_CUR) { |
6feb9891 | 950 | int rc; |
496ad9aa | 951 | struct inode *inode = file_inode(file); |
6feb9891 PS |
952 | |
953 | /* | |
954 | * We need to be sure that all dirty pages are written and the | |
955 | * server has the newest file length. | |
956 | */ | |
18cceb6a | 957 | if (!CIFS_CACHE_READ(CIFS_I(inode)) && inode->i_mapping && |
6feb9891 PS |
958 | inode->i_mapping->nrpages != 0) { |
959 | rc = filemap_fdatawait(inode->i_mapping); | |
156ecb2d SF |
960 | if (rc) { |
961 | mapping_set_error(inode->i_mapping, rc); | |
962 | return rc; | |
963 | } | |
6feb9891 PS |
964 | } |
965 | /* | |
966 | * Some applications poll for the file length in this strange | |
967 | * way so we must seek to end on non-oplocked files by | |
968 | * setting the revalidate time to zero. | |
969 | */ | |
970 | CIFS_I(inode)->time = 0; | |
971 | ||
972 | rc = cifs_revalidate_file_attr(file); | |
973 | if (rc < 0) | |
974 | return (loff_t)rc; | |
c32a0b68 | 975 | } |
dece44e3 RS |
976 | if (cfile && cfile->tlink) { |
977 | tcon = tlink_tcon(cfile->tlink); | |
978 | if (tcon->ses->server->ops->llseek) | |
979 | return tcon->ses->server->ops->llseek(file, tcon, | |
980 | offset, whence); | |
981 | } | |
965c8e59 | 982 | return generic_file_llseek(file, offset, whence); |
c32a0b68 SF |
983 | } |
984 | ||
e6f5c789 JL |
985 | static int |
986 | cifs_setlease(struct file *file, long arg, struct file_lock **lease, void **priv) | |
84210e91 | 987 | { |
18cceb6a PS |
988 | /* |
989 | * Note that this is called by vfs setlease with i_lock held to | |
990 | * protect *lease from going away. | |
991 | */ | |
496ad9aa | 992 | struct inode *inode = file_inode(file); |
ba00ba64 | 993 | struct cifsFileInfo *cfile = file->private_data; |
84210e91 SF |
994 | |
995 | if (!(S_ISREG(inode->i_mode))) | |
996 | return -EINVAL; | |
997 | ||
02440806 JL |
998 | /* Check if file is oplocked if this is request for new lease */ |
999 | if (arg == F_UNLCK || | |
1000 | ((arg == F_RDLCK) && CIFS_CACHE_READ(CIFS_I(inode))) || | |
18cceb6a | 1001 | ((arg == F_WRLCK) && CIFS_CACHE_WRITE(CIFS_I(inode)))) |
e6f5c789 | 1002 | return generic_setlease(file, arg, lease, priv); |
13cfb733 | 1003 | else if (tlink_tcon(cfile->tlink)->local_lease && |
18cceb6a PS |
1004 | !CIFS_CACHE_READ(CIFS_I(inode))) |
1005 | /* | |
1006 | * If the server claims to support oplock on this file, then we | |
1007 | * still need to check oplock even if the local_lease mount | |
1008 | * option is set, but there are servers which do not support | |
1009 | * oplock for which this mount option may be useful if the user | |
1010 | * knows that the file won't be changed on the server by anyone | |
1011 | * else. | |
1012 | */ | |
e6f5c789 | 1013 | return generic_setlease(file, arg, lease, priv); |
51ee4b84 | 1014 | else |
84210e91 SF |
1015 | return -EAGAIN; |
1016 | } | |
84210e91 | 1017 | |
e6ab1582 | 1018 | struct file_system_type cifs_fs_type = { |
1da177e4 LT |
1019 | .owner = THIS_MODULE, |
1020 | .name = "cifs", | |
d753ed97 | 1021 | .mount = cifs_do_mount, |
6d686175 | 1022 | .kill_sb = cifs_kill_sb, |
c7e9f78f | 1023 | .fs_flags = FS_RENAME_DOES_D_MOVE, |
1da177e4 | 1024 | }; |
3e64fe5b | 1025 | MODULE_ALIAS_FS("cifs"); |
49218b4f SF |
1026 | |
1027 | static struct file_system_type smb3_fs_type = { | |
1028 | .owner = THIS_MODULE, | |
1029 | .name = "smb3", | |
c7c137b9 | 1030 | .mount = smb3_do_mount, |
49218b4f | 1031 | .kill_sb = cifs_kill_sb, |
c7e9f78f | 1032 | .fs_flags = FS_RENAME_DOES_D_MOVE, |
49218b4f SF |
1033 | }; |
1034 | MODULE_ALIAS_FS("smb3"); | |
1035 | MODULE_ALIAS("smb3"); | |
1036 | ||
754661f1 | 1037 | const struct inode_operations cifs_dir_inode_ops = { |
1da177e4 | 1038 | .create = cifs_create, |
d2c12719 | 1039 | .atomic_open = cifs_atomic_open, |
1da177e4 LT |
1040 | .lookup = cifs_lookup, |
1041 | .getattr = cifs_getattr, | |
1042 | .unlink = cifs_unlink, | |
1043 | .link = cifs_hardlink, | |
1044 | .mkdir = cifs_mkdir, | |
1045 | .rmdir = cifs_rmdir, | |
2773bf00 | 1046 | .rename = cifs_rename2, |
1da177e4 | 1047 | .permission = cifs_permission, |
1da177e4 LT |
1048 | .setattr = cifs_setattr, |
1049 | .symlink = cifs_symlink, | |
1050 | .mknod = cifs_mknod, | |
1da177e4 | 1051 | .listxattr = cifs_listxattr, |
1da177e4 LT |
1052 | }; |
1053 | ||
754661f1 | 1054 | const struct inode_operations cifs_file_inode_ops = { |
1da177e4 | 1055 | .setattr = cifs_setattr, |
48a77aa7 | 1056 | .getattr = cifs_getattr, |
1da177e4 | 1057 | .permission = cifs_permission, |
1da177e4 | 1058 | .listxattr = cifs_listxattr, |
2f3ebaba | 1059 | .fiemap = cifs_fiemap, |
1da177e4 LT |
1060 | }; |
1061 | ||
754661f1 | 1062 | const struct inode_operations cifs_symlink_inode_ops = { |
6b255391 | 1063 | .get_link = cifs_get_link, |
1da177e4 | 1064 | .permission = cifs_permission, |
1da177e4 | 1065 | .listxattr = cifs_listxattr, |
1da177e4 LT |
1066 | }; |
1067 | ||
42ec3d4c DW |
1068 | static loff_t cifs_remap_file_range(struct file *src_file, loff_t off, |
1069 | struct file *dst_file, loff_t destoff, loff_t len, | |
2e5dfc99 | 1070 | unsigned int remap_flags) |
04b38d60 CH |
1071 | { |
1072 | struct inode *src_inode = file_inode(src_file); | |
1073 | struct inode *target_inode = file_inode(dst_file); | |
1074 | struct cifsFileInfo *smb_file_src = src_file->private_data; | |
8c6c9bed CIK |
1075 | struct cifsFileInfo *smb_file_target; |
1076 | struct cifs_tcon *target_tcon; | |
04b38d60 CH |
1077 | unsigned int xid; |
1078 | int rc; | |
1079 | ||
b073a080 | 1080 | if (remap_flags & ~(REMAP_FILE_DEDUP | REMAP_FILE_ADVISORY)) |
2e5dfc99 DW |
1081 | return -EINVAL; |
1082 | ||
04b38d60 CH |
1083 | cifs_dbg(FYI, "clone range\n"); |
1084 | ||
1085 | xid = get_xid(); | |
1086 | ||
1087 | if (!src_file->private_data || !dst_file->private_data) { | |
1088 | rc = -EBADF; | |
1089 | cifs_dbg(VFS, "missing cifsFileInfo on copy range src file\n"); | |
1090 | goto out; | |
1091 | } | |
1092 | ||
8c6c9bed CIK |
1093 | smb_file_target = dst_file->private_data; |
1094 | target_tcon = tlink_tcon(smb_file_target->tlink); | |
1095 | ||
04b38d60 CH |
1096 | /* |
1097 | * Note: cifs case is easier than btrfs since server responsible for | |
1098 | * checks for proper open modes and file type and if it wants | |
1099 | * server could even support copy of range where source = target | |
1100 | */ | |
1101 | lock_two_nondirectories(target_inode, src_inode); | |
1102 | ||
1103 | if (len == 0) | |
1104 | len = src_inode->i_size - off; | |
1105 | ||
1106 | cifs_dbg(FYI, "about to flush pages\n"); | |
1107 | /* should we flush first and last page first */ | |
1108 | truncate_inode_pages_range(&target_inode->i_data, destoff, | |
09cbfeaf | 1109 | PAGE_ALIGN(destoff + len)-1); |
04b38d60 CH |
1110 | |
1111 | if (target_tcon->ses->server->ops->duplicate_extents) | |
1112 | rc = target_tcon->ses->server->ops->duplicate_extents(xid, | |
1113 | smb_file_src, smb_file_target, off, len, destoff); | |
1114 | else | |
1115 | rc = -EOPNOTSUPP; | |
1116 | ||
1117 | /* force revalidate of size and timestamps of target file now | |
1118 | that target is updated on the server */ | |
1119 | CIFS_I(target_inode)->time = 0; | |
04b38d60 CH |
1120 | /* although unlocking in the reverse order from locking is not |
1121 | strictly necessary here it is a little cleaner to be consistent */ | |
1122 | unlock_two_nondirectories(src_inode, target_inode); | |
1123 | out: | |
1124 | free_xid(xid); | |
42ec3d4c | 1125 | return rc < 0 ? rc : len; |
04b38d60 CH |
1126 | } |
1127 | ||
620d8745 SP |
1128 | ssize_t cifs_file_copychunk_range(unsigned int xid, |
1129 | struct file *src_file, loff_t off, | |
1130 | struct file *dst_file, loff_t destoff, | |
1131 | size_t len, unsigned int flags) | |
1132 | { | |
1133 | struct inode *src_inode = file_inode(src_file); | |
1134 | struct inode *target_inode = file_inode(dst_file); | |
1135 | struct cifsFileInfo *smb_file_src; | |
1136 | struct cifsFileInfo *smb_file_target; | |
1137 | struct cifs_tcon *src_tcon; | |
1138 | struct cifs_tcon *target_tcon; | |
1139 | ssize_t rc; | |
1140 | ||
1141 | cifs_dbg(FYI, "copychunk range\n"); | |
1142 | ||
620d8745 SP |
1143 | if (!src_file->private_data || !dst_file->private_data) { |
1144 | rc = -EBADF; | |
1145 | cifs_dbg(VFS, "missing cifsFileInfo on copy range src file\n"); | |
1146 | goto out; | |
1147 | } | |
1148 | ||
1149 | rc = -EXDEV; | |
1150 | smb_file_target = dst_file->private_data; | |
1151 | smb_file_src = src_file->private_data; | |
1152 | src_tcon = tlink_tcon(smb_file_src->tlink); | |
1153 | target_tcon = tlink_tcon(smb_file_target->tlink); | |
1154 | ||
1155 | if (src_tcon->ses != target_tcon->ses) { | |
1156 | cifs_dbg(VFS, "source and target of copy not on same server\n"); | |
1157 | goto out; | |
1158 | } | |
1159 | ||
bf3c90ee AG |
1160 | rc = -EOPNOTSUPP; |
1161 | if (!target_tcon->ses->server->ops->copychunk_range) | |
1162 | goto out; | |
1163 | ||
620d8745 SP |
1164 | /* |
1165 | * Note: cifs case is easier than btrfs since server responsible for | |
1166 | * checks for proper open modes and file type and if it wants | |
1167 | * server could even support copy of range where source = target | |
1168 | */ | |
1169 | lock_two_nondirectories(target_inode, src_inode); | |
1170 | ||
1171 | cifs_dbg(FYI, "about to flush pages\n"); | |
1172 | /* should we flush first and last page first */ | |
1173 | truncate_inode_pages(&target_inode->i_data, 0); | |
1174 | ||
bf3c90ee AG |
1175 | rc = file_modified(dst_file); |
1176 | if (!rc) | |
620d8745 SP |
1177 | rc = target_tcon->ses->server->ops->copychunk_range(xid, |
1178 | smb_file_src, smb_file_target, off, len, destoff); | |
bf3c90ee AG |
1179 | |
1180 | file_accessed(src_file); | |
620d8745 SP |
1181 | |
1182 | /* force revalidate of size and timestamps of target file now | |
1183 | * that target is updated on the server | |
1184 | */ | |
1185 | CIFS_I(target_inode)->time = 0; | |
1186 | /* although unlocking in the reverse order from locking is not | |
1187 | * strictly necessary here it is a little cleaner to be consistent | |
1188 | */ | |
1189 | unlock_two_nondirectories(src_inode, target_inode); | |
1190 | ||
1191 | out: | |
1192 | return rc; | |
1193 | } | |
1194 | ||
6e70c267 SF |
1195 | /* |
1196 | * Directory operations under CIFS/SMB2/SMB3 are synchronous, so fsync() | |
1197 | * is a dummy operation. | |
1198 | */ | |
1199 | static int cifs_dir_fsync(struct file *file, loff_t start, loff_t end, int datasync) | |
1200 | { | |
1201 | cifs_dbg(FYI, "Sync directory - name: %pD datasync: 0x%x\n", | |
1202 | file, datasync); | |
1203 | ||
1204 | return 0; | |
1205 | } | |
1206 | ||
620d8745 SP |
1207 | static ssize_t cifs_copy_file_range(struct file *src_file, loff_t off, |
1208 | struct file *dst_file, loff_t destoff, | |
1209 | size_t len, unsigned int flags) | |
1210 | { | |
1211 | unsigned int xid = get_xid(); | |
1212 | ssize_t rc; | |
4e8aea30 SF |
1213 | struct cifsFileInfo *cfile = dst_file->private_data; |
1214 | ||
1215 | if (cfile->swapfile) | |
1216 | return -EOPNOTSUPP; | |
620d8745 SP |
1217 | |
1218 | rc = cifs_file_copychunk_range(xid, src_file, off, dst_file, destoff, | |
1219 | len, flags); | |
1220 | free_xid(xid); | |
64bf5ff5 | 1221 | |
5dae222a | 1222 | if (rc == -EOPNOTSUPP || rc == -EXDEV) |
64bf5ff5 DC |
1223 | rc = generic_copy_file_range(src_file, off, dst_file, |
1224 | destoff, len, flags); | |
620d8745 SP |
1225 | return rc; |
1226 | } | |
1227 | ||
4b6f5d20 | 1228 | const struct file_operations cifs_file_ops = { |
08bc0353 | 1229 | .read_iter = cifs_loose_read_iter, |
3dae8750 | 1230 | .write_iter = cifs_file_write_iter, |
1da177e4 LT |
1231 | .open = cifs_open, |
1232 | .release = cifs_close, | |
1233 | .lock = cifs_lock, | |
d0677992 | 1234 | .flock = cifs_flock, |
1da177e4 LT |
1235 | .fsync = cifs_fsync, |
1236 | .flush = cifs_flush, | |
1237 | .mmap = cifs_file_mmap, | |
5ffc4ef4 | 1238 | .splice_read = generic_file_splice_read, |
cd1aca29 | 1239 | .splice_write = iter_file_splice_write, |
c32a0b68 | 1240 | .llseek = cifs_llseek, |
f9ddcca4 | 1241 | .unlocked_ioctl = cifs_ioctl, |
620d8745 | 1242 | .copy_file_range = cifs_copy_file_range, |
2e5dfc99 | 1243 | .remap_file_range = cifs_remap_file_range, |
84210e91 | 1244 | .setlease = cifs_setlease, |
31742c5a | 1245 | .fallocate = cifs_fallocate, |
1da177e4 LT |
1246 | }; |
1247 | ||
8be7e6ba | 1248 | const struct file_operations cifs_file_strict_ops = { |
e6a7bcb4 | 1249 | .read_iter = cifs_strict_readv, |
3dae8750 | 1250 | .write_iter = cifs_strict_writev, |
8be7e6ba PS |
1251 | .open = cifs_open, |
1252 | .release = cifs_close, | |
1253 | .lock = cifs_lock, | |
d0677992 | 1254 | .flock = cifs_flock, |
8be7e6ba PS |
1255 | .fsync = cifs_strict_fsync, |
1256 | .flush = cifs_flush, | |
7a6a19b1 | 1257 | .mmap = cifs_file_strict_mmap, |
8be7e6ba | 1258 | .splice_read = generic_file_splice_read, |
cd1aca29 | 1259 | .splice_write = iter_file_splice_write, |
8be7e6ba | 1260 | .llseek = cifs_llseek, |
8be7e6ba | 1261 | .unlocked_ioctl = cifs_ioctl, |
620d8745 | 1262 | .copy_file_range = cifs_copy_file_range, |
2e5dfc99 | 1263 | .remap_file_range = cifs_remap_file_range, |
8be7e6ba | 1264 | .setlease = cifs_setlease, |
31742c5a | 1265 | .fallocate = cifs_fallocate, |
8be7e6ba PS |
1266 | }; |
1267 | ||
4b6f5d20 | 1268 | const struct file_operations cifs_file_direct_ops = { |
be4eb688 LL |
1269 | .read_iter = cifs_direct_readv, |
1270 | .write_iter = cifs_direct_writev, | |
1da177e4 LT |
1271 | .open = cifs_open, |
1272 | .release = cifs_close, | |
1273 | .lock = cifs_lock, | |
d0677992 | 1274 | .flock = cifs_flock, |
1da177e4 LT |
1275 | .fsync = cifs_fsync, |
1276 | .flush = cifs_flush, | |
a994b8fa | 1277 | .mmap = cifs_file_mmap, |
5ffc4ef4 | 1278 | .splice_read = generic_file_splice_read, |
cd1aca29 | 1279 | .splice_write = iter_file_splice_write, |
f9ddcca4 | 1280 | .unlocked_ioctl = cifs_ioctl, |
620d8745 | 1281 | .copy_file_range = cifs_copy_file_range, |
2e5dfc99 | 1282 | .remap_file_range = cifs_remap_file_range, |
c32a0b68 | 1283 | .llseek = cifs_llseek, |
84210e91 | 1284 | .setlease = cifs_setlease, |
31742c5a | 1285 | .fallocate = cifs_fallocate, |
1da177e4 | 1286 | }; |
8be7e6ba | 1287 | |
4b6f5d20 | 1288 | const struct file_operations cifs_file_nobrl_ops = { |
08bc0353 | 1289 | .read_iter = cifs_loose_read_iter, |
3dae8750 | 1290 | .write_iter = cifs_file_write_iter, |
87c89dd7 SF |
1291 | .open = cifs_open, |
1292 | .release = cifs_close, | |
1293 | .fsync = cifs_fsync, | |
1294 | .flush = cifs_flush, | |
1295 | .mmap = cifs_file_mmap, | |
5ffc4ef4 | 1296 | .splice_read = generic_file_splice_read, |
cd1aca29 | 1297 | .splice_write = iter_file_splice_write, |
c32a0b68 | 1298 | .llseek = cifs_llseek, |
f9ddcca4 | 1299 | .unlocked_ioctl = cifs_ioctl, |
620d8745 | 1300 | .copy_file_range = cifs_copy_file_range, |
2e5dfc99 | 1301 | .remap_file_range = cifs_remap_file_range, |
84210e91 | 1302 | .setlease = cifs_setlease, |
31742c5a | 1303 | .fallocate = cifs_fallocate, |
8b94bcb9 SF |
1304 | }; |
1305 | ||
8be7e6ba | 1306 | const struct file_operations cifs_file_strict_nobrl_ops = { |
e6a7bcb4 | 1307 | .read_iter = cifs_strict_readv, |
3dae8750 | 1308 | .write_iter = cifs_strict_writev, |
8be7e6ba PS |
1309 | .open = cifs_open, |
1310 | .release = cifs_close, | |
1311 | .fsync = cifs_strict_fsync, | |
1312 | .flush = cifs_flush, | |
7a6a19b1 | 1313 | .mmap = cifs_file_strict_mmap, |
8be7e6ba | 1314 | .splice_read = generic_file_splice_read, |
cd1aca29 | 1315 | .splice_write = iter_file_splice_write, |
8be7e6ba | 1316 | .llseek = cifs_llseek, |
8be7e6ba | 1317 | .unlocked_ioctl = cifs_ioctl, |
620d8745 | 1318 | .copy_file_range = cifs_copy_file_range, |
2e5dfc99 | 1319 | .remap_file_range = cifs_remap_file_range, |
8be7e6ba | 1320 | .setlease = cifs_setlease, |
31742c5a | 1321 | .fallocate = cifs_fallocate, |
8be7e6ba PS |
1322 | }; |
1323 | ||
4b6f5d20 | 1324 | const struct file_operations cifs_file_direct_nobrl_ops = { |
be4eb688 LL |
1325 | .read_iter = cifs_direct_readv, |
1326 | .write_iter = cifs_direct_writev, | |
87c89dd7 SF |
1327 | .open = cifs_open, |
1328 | .release = cifs_close, | |
1329 | .fsync = cifs_fsync, | |
1330 | .flush = cifs_flush, | |
810627a0 | 1331 | .mmap = cifs_file_mmap, |
5ffc4ef4 | 1332 | .splice_read = generic_file_splice_read, |
cd1aca29 | 1333 | .splice_write = iter_file_splice_write, |
f9ddcca4 | 1334 | .unlocked_ioctl = cifs_ioctl, |
620d8745 | 1335 | .copy_file_range = cifs_copy_file_range, |
2e5dfc99 | 1336 | .remap_file_range = cifs_remap_file_range, |
c32a0b68 | 1337 | .llseek = cifs_llseek, |
84210e91 | 1338 | .setlease = cifs_setlease, |
31742c5a | 1339 | .fallocate = cifs_fallocate, |
8b94bcb9 | 1340 | }; |
1da177e4 | 1341 | |
4b6f5d20 | 1342 | const struct file_operations cifs_dir_ops = { |
3125d265 | 1343 | .iterate_shared = cifs_readdir, |
1da177e4 LT |
1344 | .release = cifs_closedir, |
1345 | .read = generic_read_dir, | |
f9ddcca4 | 1346 | .unlocked_ioctl = cifs_ioctl, |
620d8745 | 1347 | .copy_file_range = cifs_copy_file_range, |
2e5dfc99 | 1348 | .remap_file_range = cifs_remap_file_range, |
3222a3e5 | 1349 | .llseek = generic_file_llseek, |
6e70c267 | 1350 | .fsync = cifs_dir_fsync, |
1da177e4 LT |
1351 | }; |
1352 | ||
1353 | static void | |
51cc5068 | 1354 | cifs_init_once(void *inode) |
1da177e4 LT |
1355 | { |
1356 | struct cifsInodeInfo *cifsi = inode; | |
1357 | ||
a35afb83 | 1358 | inode_init_once(&cifsi->vfs_inode); |
1b4b55a1 | 1359 | init_rwsem(&cifsi->lock_sem); |
1da177e4 LT |
1360 | } |
1361 | ||
9ee108b2 | 1362 | static int __init |
1da177e4 LT |
1363 | cifs_init_inodecache(void) |
1364 | { | |
1365 | cifs_inode_cachep = kmem_cache_create("cifs_inode_cache", | |
26f57364 | 1366 | sizeof(struct cifsInodeInfo), |
fffb60f9 | 1367 | 0, (SLAB_RECLAIM_ACCOUNT| |
5d097056 | 1368 | SLAB_MEM_SPREAD|SLAB_ACCOUNT), |
20c2df83 | 1369 | cifs_init_once); |
1da177e4 LT |
1370 | if (cifs_inode_cachep == NULL) |
1371 | return -ENOMEM; | |
1372 | ||
1373 | return 0; | |
1374 | } | |
1375 | ||
1376 | static void | |
1377 | cifs_destroy_inodecache(void) | |
1378 | { | |
8c0a8537 KS |
1379 | /* |
1380 | * Make sure all delayed rcu free inodes are flushed before we | |
1381 | * destroy cache. | |
1382 | */ | |
1383 | rcu_barrier(); | |
1a1d92c1 | 1384 | kmem_cache_destroy(cifs_inode_cachep); |
1da177e4 LT |
1385 | } |
1386 | ||
1387 | static int | |
1388 | cifs_init_request_bufs(void) | |
1389 | { | |
3792c173 PS |
1390 | /* |
1391 | * SMB2 maximum header size is bigger than CIFS one - no problems to | |
1392 | * allocate some more bytes for CIFS. | |
1393 | */ | |
2a38e120 SF |
1394 | size_t max_hdr_size = MAX_SMB2_HDR_SIZE; |
1395 | ||
4523cc30 | 1396 | if (CIFSMaxBufSize < 8192) { |
1da177e4 LT |
1397 | /* Buffer size can not be smaller than 2 * PATH_MAX since maximum |
1398 | Unicode path name has to fit in any SMB/CIFS path based frames */ | |
1399 | CIFSMaxBufSize = 8192; | |
1400 | } else if (CIFSMaxBufSize > 1024*127) { | |
1401 | CIFSMaxBufSize = 1024 * 127; | |
1402 | } else { | |
1403 | CIFSMaxBufSize &= 0x1FE00; /* Round size to even 512 byte mult*/ | |
1404 | } | |
f96637be JP |
1405 | /* |
1406 | cifs_dbg(VFS, "CIFSMaxBufSize %d 0x%x\n", | |
1407 | CIFSMaxBufSize, CIFSMaxBufSize); | |
1408 | */ | |
de046449 | 1409 | cifs_req_cachep = kmem_cache_create_usercopy("cifs_request", |
3792c173 | 1410 | CIFSMaxBufSize + max_hdr_size, 0, |
de046449 DW |
1411 | SLAB_HWCACHE_ALIGN, 0, |
1412 | CIFSMaxBufSize + max_hdr_size, | |
1413 | NULL); | |
1da177e4 LT |
1414 | if (cifs_req_cachep == NULL) |
1415 | return -ENOMEM; | |
1416 | ||
4523cc30 | 1417 | if (cifs_min_rcv < 1) |
1da177e4 LT |
1418 | cifs_min_rcv = 1; |
1419 | else if (cifs_min_rcv > 64) { | |
1420 | cifs_min_rcv = 64; | |
f96637be | 1421 | cifs_dbg(VFS, "cifs_min_rcv set to maximum (64)\n"); |
1da177e4 LT |
1422 | } |
1423 | ||
93d2341c MD |
1424 | cifs_req_poolp = mempool_create_slab_pool(cifs_min_rcv, |
1425 | cifs_req_cachep); | |
1da177e4 | 1426 | |
4523cc30 | 1427 | if (cifs_req_poolp == NULL) { |
1da177e4 LT |
1428 | kmem_cache_destroy(cifs_req_cachep); |
1429 | return -ENOMEM; | |
1430 | } | |
ec637e3f | 1431 | /* MAX_CIFS_SMALL_BUFFER_SIZE bytes is enough for most SMB responses and |
1da177e4 LT |
1432 | almost all handle based requests (but not write response, nor is it |
1433 | sufficient for path based requests). A smaller size would have | |
50c2f753 | 1434 | been more efficient (compacting multiple slab items on one 4k page) |
1da177e4 LT |
1435 | for the case in which debug was on, but this larger size allows |
1436 | more SMBs to use small buffer alloc and is still much more | |
6dc0f87e | 1437 | efficient to alloc 1 per page off the slab compared to 17K (5page) |
1da177e4 | 1438 | alloc of large cifs buffers even when page debugging is on */ |
de046449 | 1439 | cifs_sm_req_cachep = kmem_cache_create_usercopy("cifs_small_rq", |
6dc0f87e | 1440 | MAX_CIFS_SMALL_BUFFER_SIZE, 0, SLAB_HWCACHE_ALIGN, |
de046449 | 1441 | 0, MAX_CIFS_SMALL_BUFFER_SIZE, NULL); |
1da177e4 LT |
1442 | if (cifs_sm_req_cachep == NULL) { |
1443 | mempool_destroy(cifs_req_poolp); | |
1444 | kmem_cache_destroy(cifs_req_cachep); | |
6dc0f87e | 1445 | return -ENOMEM; |
1da177e4 LT |
1446 | } |
1447 | ||
4523cc30 | 1448 | if (cifs_min_small < 2) |
1da177e4 LT |
1449 | cifs_min_small = 2; |
1450 | else if (cifs_min_small > 256) { | |
1451 | cifs_min_small = 256; | |
f96637be | 1452 | cifs_dbg(FYI, "cifs_min_small set to maximum (256)\n"); |
1da177e4 LT |
1453 | } |
1454 | ||
93d2341c MD |
1455 | cifs_sm_req_poolp = mempool_create_slab_pool(cifs_min_small, |
1456 | cifs_sm_req_cachep); | |
1da177e4 | 1457 | |
4523cc30 | 1458 | if (cifs_sm_req_poolp == NULL) { |
1da177e4 LT |
1459 | mempool_destroy(cifs_req_poolp); |
1460 | kmem_cache_destroy(cifs_req_cachep); | |
1461 | kmem_cache_destroy(cifs_sm_req_cachep); | |
1462 | return -ENOMEM; | |
1463 | } | |
1464 | ||
1465 | return 0; | |
1466 | } | |
1467 | ||
1468 | static void | |
1469 | cifs_destroy_request_bufs(void) | |
1470 | { | |
1471 | mempool_destroy(cifs_req_poolp); | |
1a1d92c1 | 1472 | kmem_cache_destroy(cifs_req_cachep); |
1da177e4 | 1473 | mempool_destroy(cifs_sm_req_poolp); |
1a1d92c1 | 1474 | kmem_cache_destroy(cifs_sm_req_cachep); |
1da177e4 LT |
1475 | } |
1476 | ||
1477 | static int | |
1478 | cifs_init_mids(void) | |
1479 | { | |
1480 | cifs_mid_cachep = kmem_cache_create("cifs_mpx_ids", | |
26f57364 SF |
1481 | sizeof(struct mid_q_entry), 0, |
1482 | SLAB_HWCACHE_ALIGN, NULL); | |
1da177e4 LT |
1483 | if (cifs_mid_cachep == NULL) |
1484 | return -ENOMEM; | |
1485 | ||
93d2341c MD |
1486 | /* 3 is a reasonable minimum number of simultaneous operations */ |
1487 | cifs_mid_poolp = mempool_create_slab_pool(3, cifs_mid_cachep); | |
4523cc30 | 1488 | if (cifs_mid_poolp == NULL) { |
1da177e4 LT |
1489 | kmem_cache_destroy(cifs_mid_cachep); |
1490 | return -ENOMEM; | |
1491 | } | |
1492 | ||
1da177e4 LT |
1493 | return 0; |
1494 | } | |
1495 | ||
1496 | static void | |
1497 | cifs_destroy_mids(void) | |
1498 | { | |
1499 | mempool_destroy(cifs_mid_poolp); | |
1a1d92c1 | 1500 | kmem_cache_destroy(cifs_mid_cachep); |
1da177e4 LT |
1501 | } |
1502 | ||
1da177e4 LT |
1503 | static int __init |
1504 | init_cifs(void) | |
1505 | { | |
1506 | int rc = 0; | |
1da177e4 | 1507 | cifs_proc_init(); |
e7ddee90 | 1508 | INIT_LIST_HEAD(&cifs_tcp_ses_list); |
0eff0e26 | 1509 | #ifdef CONFIG_CIFS_DNOTIFY_EXPERIMENTAL /* unused temporarily */ |
4ca9c190 SF |
1510 | INIT_LIST_HEAD(&GlobalDnotifyReqList); |
1511 | INIT_LIST_HEAD(&GlobalDnotifyRsp_Q); | |
0eff0e26 | 1512 | #endif /* was needed for dnotify, and will be needed for inotify when VFS fix */ |
1da177e4 LT |
1513 | /* |
1514 | * Initialize Global counters | |
1515 | */ | |
1516 | atomic_set(&sesInfoAllocCount, 0); | |
1517 | atomic_set(&tconInfoAllocCount, 0); | |
6dc0f87e | 1518 | atomic_set(&tcpSesAllocCount, 0); |
1da177e4 LT |
1519 | atomic_set(&tcpSesReconnectCount, 0); |
1520 | atomic_set(&tconInfoReconnectCount, 0); | |
1521 | ||
1522 | atomic_set(&bufAllocCount, 0); | |
4498eed5 SF |
1523 | atomic_set(&smBufAllocCount, 0); |
1524 | #ifdef CONFIG_CIFS_STATS2 | |
1525 | atomic_set(&totBufAllocCount, 0); | |
1526 | atomic_set(&totSmBufAllocCount, 0); | |
00778e22 SF |
1527 | if (slow_rsp_threshold < 1) |
1528 | cifs_dbg(FYI, "slow_response_threshold msgs disabled\n"); | |
1529 | else if (slow_rsp_threshold > 32767) | |
1530 | cifs_dbg(VFS, | |
1531 | "slow response threshold set higher than recommended (0 to 32767)\n"); | |
4498eed5 SF |
1532 | #endif /* CONFIG_CIFS_STATS2 */ |
1533 | ||
1da177e4 LT |
1534 | atomic_set(&midCount, 0); |
1535 | GlobalCurrentXid = 0; | |
1536 | GlobalTotalActiveXid = 0; | |
1537 | GlobalMaxActiveXid = 0; | |
3f9bcca7 | 1538 | spin_lock_init(&cifs_tcp_ses_lock); |
1da177e4 LT |
1539 | spin_lock_init(&GlobalMid_Lock); |
1540 | ||
51b0817b | 1541 | cifs_lock_secret = get_random_u32(); |
3d22462a | 1542 | |
4523cc30 | 1543 | if (cifs_max_pending < 2) { |
1da177e4 | 1544 | cifs_max_pending = 2; |
f96637be | 1545 | cifs_dbg(FYI, "cifs_max_pending set to min of 2\n"); |
10b9b98e PS |
1546 | } else if (cifs_max_pending > CIFS_MAX_REQ) { |
1547 | cifs_max_pending = CIFS_MAX_REQ; | |
f96637be JP |
1548 | cifs_dbg(FYI, "cifs_max_pending set to max of %u\n", |
1549 | CIFS_MAX_REQ); | |
1da177e4 LT |
1550 | } |
1551 | ||
da472fc8 JL |
1552 | cifsiod_wq = alloc_workqueue("cifsiod", WQ_FREEZABLE|WQ_MEM_RECLAIM, 0); |
1553 | if (!cifsiod_wq) { | |
1554 | rc = -ENOMEM; | |
1555 | goto out_clean_proc; | |
1556 | } | |
1557 | ||
35cf94a3 | 1558 | /* |
10328c44 SF |
1559 | * Consider in future setting limit!=0 maybe to min(num_of_cores - 1, 3) |
1560 | * so that we don't launch too many worker threads but | |
0ac624f4 | 1561 | * Documentation/core-api/workqueue.rst recommends setting it to 0 |
35cf94a3 | 1562 | */ |
10328c44 SF |
1563 | |
1564 | /* WQ_UNBOUND allows decrypt tasks to run on any CPU */ | |
35cf94a3 | 1565 | decrypt_wq = alloc_workqueue("smb3decryptd", |
10328c44 | 1566 | WQ_UNBOUND|WQ_FREEZABLE|WQ_MEM_RECLAIM, 0); |
35cf94a3 SF |
1567 | if (!decrypt_wq) { |
1568 | rc = -ENOMEM; | |
1569 | goto out_destroy_cifsiod_wq; | |
1570 | } | |
1571 | ||
32546a95 RS |
1572 | fileinfo_put_wq = alloc_workqueue("cifsfileinfoput", |
1573 | WQ_UNBOUND|WQ_FREEZABLE|WQ_MEM_RECLAIM, 0); | |
1574 | if (!fileinfo_put_wq) { | |
1575 | rc = -ENOMEM; | |
1576 | goto out_destroy_decrypt_wq; | |
1577 | } | |
1578 | ||
3998e6b8 RV |
1579 | cifsoplockd_wq = alloc_workqueue("cifsoplockd", |
1580 | WQ_FREEZABLE|WQ_MEM_RECLAIM, 0); | |
1581 | if (!cifsoplockd_wq) { | |
1582 | rc = -ENOMEM; | |
32546a95 | 1583 | goto out_destroy_fileinfo_put_wq; |
3998e6b8 RV |
1584 | } |
1585 | ||
f579cf3c SJ |
1586 | rc = cifs_fscache_register(); |
1587 | if (rc) | |
3998e6b8 | 1588 | goto out_destroy_cifsoplockd_wq; |
f579cf3c | 1589 | |
1da177e4 | 1590 | rc = cifs_init_inodecache(); |
45af7a0f | 1591 | if (rc) |
d3bf5221 | 1592 | goto out_unreg_fscache; |
45af7a0f SF |
1593 | |
1594 | rc = cifs_init_mids(); | |
1595 | if (rc) | |
1596 | goto out_destroy_inodecache; | |
1597 | ||
1598 | rc = cifs_init_request_bufs(); | |
1599 | if (rc) | |
1600 | goto out_destroy_mids; | |
1601 | ||
1c780228 PA |
1602 | #ifdef CONFIG_CIFS_DFS_UPCALL |
1603 | rc = dfs_cache_init(); | |
1604 | if (rc) | |
1605 | goto out_destroy_request_bufs; | |
1606 | #endif /* CONFIG_CIFS_DFS_UPCALL */ | |
84a15b93 | 1607 | #ifdef CONFIG_CIFS_UPCALL |
b74cb9a8 | 1608 | rc = init_cifs_spnego(); |
84a15b93 | 1609 | if (rc) |
1c780228 | 1610 | goto out_destroy_dfs_cache; |
4d79dba0 SP |
1611 | #endif /* CONFIG_CIFS_UPCALL */ |
1612 | ||
4d79dba0 SP |
1613 | rc = init_cifs_idmap(); |
1614 | if (rc) | |
c4aca0c0 | 1615 | goto out_register_key_type; |
4d79dba0 SP |
1616 | |
1617 | rc = register_filesystem(&cifs_fs_type); | |
1618 | if (rc) | |
c4aca0c0 | 1619 | goto out_init_cifs_idmap; |
45af7a0f | 1620 | |
49218b4f SF |
1621 | rc = register_filesystem(&smb3_fs_type); |
1622 | if (rc) { | |
1623 | unregister_filesystem(&cifs_fs_type); | |
1624 | goto out_init_cifs_idmap; | |
1625 | } | |
1626 | ||
45af7a0f SF |
1627 | return 0; |
1628 | ||
c4aca0c0 | 1629 | out_init_cifs_idmap: |
4d79dba0 | 1630 | exit_cifs_idmap(); |
c4aca0c0 | 1631 | out_register_key_type: |
84a15b93 | 1632 | #ifdef CONFIG_CIFS_UPCALL |
b74cb9a8 | 1633 | exit_cifs_spnego(); |
1c780228 PA |
1634 | out_destroy_dfs_cache: |
1635 | #endif | |
1636 | #ifdef CONFIG_CIFS_DFS_UPCALL | |
1637 | dfs_cache_destroy(); | |
c4aca0c0 | 1638 | out_destroy_request_bufs: |
1fc7995d | 1639 | #endif |
45af7a0f | 1640 | cifs_destroy_request_bufs(); |
d3bf5221 | 1641 | out_destroy_mids: |
45af7a0f | 1642 | cifs_destroy_mids(); |
d3bf5221 | 1643 | out_destroy_inodecache: |
45af7a0f | 1644 | cifs_destroy_inodecache(); |
d3bf5221 | 1645 | out_unreg_fscache: |
f579cf3c | 1646 | cifs_fscache_unregister(); |
3998e6b8 RV |
1647 | out_destroy_cifsoplockd_wq: |
1648 | destroy_workqueue(cifsoplockd_wq); | |
32546a95 RS |
1649 | out_destroy_fileinfo_put_wq: |
1650 | destroy_workqueue(fileinfo_put_wq); | |
35cf94a3 SF |
1651 | out_destroy_decrypt_wq: |
1652 | destroy_workqueue(decrypt_wq); | |
3998e6b8 | 1653 | out_destroy_cifsiod_wq: |
da472fc8 | 1654 | destroy_workqueue(cifsiod_wq); |
d3bf5221 SF |
1655 | out_clean_proc: |
1656 | cifs_proc_clean(); | |
1da177e4 LT |
1657 | return rc; |
1658 | } | |
1659 | ||
1660 | static void __exit | |
1661 | exit_cifs(void) | |
1662 | { | |
49218b4f | 1663 | cifs_dbg(NOISY, "exit_smb3\n"); |
3dd93306 | 1664 | unregister_filesystem(&cifs_fs_type); |
49218b4f | 1665 | unregister_filesystem(&smb3_fs_type); |
78d31a3a | 1666 | cifs_dfs_release_automount_timer(); |
4d79dba0 | 1667 | exit_cifs_idmap(); |
84a15b93 | 1668 | #ifdef CONFIG_CIFS_UPCALL |
94183331 | 1669 | exit_cifs_spnego(); |
1c780228 PA |
1670 | #endif |
1671 | #ifdef CONFIG_CIFS_DFS_UPCALL | |
1672 | dfs_cache_destroy(); | |
1da177e4 | 1673 | #endif |
1da177e4 | 1674 | cifs_destroy_request_bufs(); |
3dd93306 JL |
1675 | cifs_destroy_mids(); |
1676 | cifs_destroy_inodecache(); | |
1677 | cifs_fscache_unregister(); | |
3998e6b8 | 1678 | destroy_workqueue(cifsoplockd_wq); |
35cf94a3 | 1679 | destroy_workqueue(decrypt_wq); |
32546a95 | 1680 | destroy_workqueue(fileinfo_put_wq); |
da472fc8 | 1681 | destroy_workqueue(cifsiod_wq); |
3dd93306 | 1682 | cifs_proc_clean(); |
1da177e4 LT |
1683 | } |
1684 | ||
1c3a13a3 | 1685 | MODULE_AUTHOR("Steve French"); |
6dc0f87e | 1686 | MODULE_LICENSE("GPL"); /* combination of LGPL + GPL source behaves as GPL */ |
1da177e4 | 1687 | MODULE_DESCRIPTION |
1c3a13a3 SF |
1688 | ("VFS to access SMB3 servers e.g. Samba, Macs, Azure and Windows (and " |
1689 | "also older servers complying with the SNIA CIFS Specification)"); | |
1da177e4 | 1690 | MODULE_VERSION(CIFS_VERSION); |
3591bb83 RS |
1691 | MODULE_SOFTDEP("ecb"); |
1692 | MODULE_SOFTDEP("hmac"); | |
1693 | MODULE_SOFTDEP("md4"); | |
1694 | MODULE_SOFTDEP("md5"); | |
1695 | MODULE_SOFTDEP("nls"); | |
1696 | MODULE_SOFTDEP("aes"); | |
1697 | MODULE_SOFTDEP("cmac"); | |
1698 | MODULE_SOFTDEP("sha256"); | |
1699 | MODULE_SOFTDEP("sha512"); | |
1700 | MODULE_SOFTDEP("aead2"); | |
1701 | MODULE_SOFTDEP("ccm"); | |
1702 | MODULE_SOFTDEP("gcm"); | |
1da177e4 LT |
1703 | module_init(init_cifs) |
1704 | module_exit(exit_cifs) |